Skip to content

This is a framework for cyber defenders to use to perform adversary infrastructure pivots to reveal additional adversary infrastructure.

License

Notifications You must be signed in to change notification settings

MalasadaTech/defenders-threatmesh-framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Defender's ThreatMesh Framework

The Defender's ThreatMesh Framework is a tool designed to empower hunt analysts in uncovering additional adversary infrastructure. By pivoting on characteristics of known malicious infrastructure—such as domain name patterns, registration details, or network behaviors—this framework provides a structured approach to expand visibility into threat actors' operations. Inspired by MITRE ATT&CK, it focuses solely on discovery, offering pivot tactics and pivots to reveal hidden connections in the wild.

Overview

  • Purpose:
    • Identify more adversary infrastructure by leveraging pivots from existing data.
    • Simplify communicating pivots to other analysts.
    • Streamline recording pivots for recurring checks.
    • Serve as a potential training guide for analysts.
  • Structure: Pivot tactics (PTAXXXX) group related pivots (PXXYY), supported by real-world examples (EXXXXX).
  • Usage: Use the matrix to explore pivot tactics and pivots.
  • hIGMA: I am in the process of implementing hIGMA - A sigma inspired data sharing concept (hunter's SIGMA). Share pivots just like SIGMA except it specific to pivots and uses DTF. The outputs can feed into masq-monitor, or thrintel sharing (AS OF 15AUG25). See EX0017: LandUpdate808 Backend C2 Analysis for the first example.

Getting Started

Check the matrix for a full list of pivot tactics and pivots with links to detailed pages. Each entry is designed to guide you through pivoting strategies, backed by practical detection methods.

Checklist

A checklist is available in checklist/checklist.md that users can utilize in Obsidian markdown viewer. Clone the repository, open it in Obsidian, and update the checklist as you perform your analysis to track progress and document findings.

Examples

Real-world examples (EXXXXX) illustrate how analysts can deploy these pivots to uncover additional adversary infrastructure. Sourced from threat intelligence reports and blogs, these instances—like phishing waves using prefixed domains or registrar overlaps—provide context and hunting tips to enhance your pivot-based investigations. See the examples/ directory for details.

Contributors

For a full list of contributors and their contributions, see contributors.md.

License

This project is licensed under the MIT License.

About

This is a framework for cyber defenders to use to perform adversary infrastructure pivots to reveal additional adversary infrastructure.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •